1. A mistake in an algorithm that cause incorrect results is called?
a) Logical error
b) Syntax error
c) Compiler error
d) Machine error
e) Procedural error
2. What is URL?
a) A computer software program
b) A type of programming object
c) The address of a document or page on the World Wide Web
d) An acronym for Unlimited Resources for learning
e) A piece of hardware

3. Which of the following would you find on LinkedIn?
a) Games
b) Connections
c) Chat d) Applications
e) None of these
4. Which of the following is the first step in seizing a window?
a) Point to the title bar
b) Pull down the view menu to display the toolbar
c) Point to any corner or border
d) Pull down the view menu and change to large icons
e) None of these
5. _____ is a technique that is used to send more than one call over a single line?
a) Digital transmission
b) Infrared transmission
c) Digitizing d) Streaming
e) Multiplexing
6. Which of these is a point-and-draw device?
a) Mouse
b) Scanner
c) Printer
e) Key board
7. The letter and number of the intersecting column and row is the?
a) Cell location
b) Cell position
c) Cell address
d) Cell coordinates
e) Cell contents
8. Which of the following is not a means of personal communication on the internet?
a) Chat
b) Instant messaging
c) Instant notes
d) Electronic mail
e) None of these
9. NIC is the acronym for?
a) Network Integrated Card
b) Network Intranet Card
c) Network Interface Card
d) No Internet Connection
e) None of the above
10. In Power Point, the Header & Footer button can be found on the Insert tab in which group?
a) Object group
b) Illustrations group
c) Text group
d) Tables group
e) None of these
11. _____ is a set of computer programs used on a computer to help perform
a) An instruction
b) Software
c) Memory
d) A processor
e) None of these
12. A string of eight 0s and 1s is called a?
a) Megabyte
b) Byte
c) Kilobyte
d) Giga byte
e) Kilo bite
13. Which of the following is not a threat to security and privacy?
a) Hackers
b) Spam
c) Viruses
d) Identify theft
e) None of these
14. A collection of programs that controls how the computer system runs and processes information is called?
a) Operating system
b) Computer
c) office
d) Compiler
e) Interpreter
15. Who among the following is the father of super computer?
a) Charles Babbage
b) Billgates
c) Steve Jobs
d) Jeff Stronstrup
e) Seymour Cray
16. What do you understand by the term ‘Booting’?
a) The process of starting the computer from the power-off position
b) Connecting the computer to the electric switch
c) Increasing the memory of the computer
d) The process of shut down the computer
e) None of these
17. Housing all hardware, software, Storage and processing in one site location is called?
a) Time sharing
b) A distributed system
c) Centralized processing
d) A host computer
e) None of these
18. _____ process rearranges file fragments into contiguous files?
a) Folder folding
b) Defragmentation
c) Unflagging
d) Disk scanning
e) File filling
19. _____ means that the data contained in a database is accurate and reliable?
a) Data redundancy
b) Data integrity
c) Data reliability
d) Data consistency
e) None of these
20. _____ is the process of carrying out commands?
a) Fetching
b) Sorting
c) Executing
d) Decoding
e) None of these
21. In Windows environment Ctrl + Z is used to?
a) Copy
b) Paste
c) Cut
d) Undo
e) None of these
22. PCB is the acronym for?
a) Processing Cache Block
b) Pixel Control Block
c) Process Control Block
d) Program Control Block
e) None of these
23. A hybrid computer uses a _____ to convert digital signals from a computer into analog signals?
a) Modem
b) Modulator
c) Demodulator
d) Decoder
e) None of these
24. Hyperlinks cannot be?
a) Of special shapes like banners
b) Pictures c) Text
d) Drawing objects like ovals
e) All of the above can be hyperlinks
25. Network components are connected in a linear sequence in _____
a) Star
b) Ring
c) Bus
d) Mesh

e) Mixed

Add a Comment

Your email address will not be published. Required fields are marked *